As pgit suggests, this tool should not work with full disk encryption. It relies on being able to see and mount the Windows partition to see/read/modify applicable files. If you encrypt the hard drive then boot a liveCD it'll report that there is a hard drive physically installed but without any readable partitions detected on it.
You could additionally password protect the BIOS and disable booting from CD and removable media. All three mitigate the risk of someone using a boot tool to reset your password but I say "additionally" because only disk encryption protects against simply popping the drive out and copying the password database to take home and crack.
(edit): Pgit mentions seporate encrypted user accounts. Just for clarity, encryption needs to include your c:\windows directory tree which contains your password database (SAM). It doesn't matter if your indavidual user areas are encrypted since the passwords would be outside of that protection.
Keep Up with TechRepublic